HTML Definitions:


Deprecated: Older HTML tags and attributes that have been superseded by other more functional or flexible alternatives (whether as HTML or as CSS ) are declared as deprecated in HTML4 by the W3C - the consortium that sets the HTML standards. (Source: http://www.codehelp.co.uk/html/deprecated.html)

Element: In computing, an HTML element indicates structure in an HTML document and a way of hierarchically arranging content. (Source: http://en.wikipedia.org/wiki/HTML_element)

Validation: The process of determining whether or not the standard at a given phase of its development fulfills the established requirements. (Source: http://www.mel.nist.gov/msid/XML_testbed/common_terms.html)

Frameset: An invisible Web page that divides a browser window into several sections, each with the ability to display a separate Web page.(Source: http://www.lankesterdesigns.biz/ld6_glossary_def.htm)

Strict: Encourages, and in some cases enforces, the separation of structure and presentation, moving the presentational aspects from markup to CSS. (Source: http://24ways.org/2005/transitional-vs-strict-markup)

Attribute: A parameter or setting for an element, which can be set on a start tag. For example, in the tag "a href="glossary.html"", the href attribute is set to "glossary.html". Most attributes are optional, but a few are required. (Source: http://www.robinlionheart.com/stds/html4/glossary)

DTD: Document Type Definition. A DTD provides a list of the elements, attributes, comments, notes, and entities contained in the document, as well as their relationships to one another. (Source: http://webdesign.about.com/library/weekly/aa070102a.htm)

Well-formed: An XML document that follows the rules set forth by the XML specification, including having an XML declaration, correct comments, all tags are closed, all attributes are quoted, every document has one "container" element. (Source: http://webdesign.about.com/library/weekly/aa070102a.htm)

Transitional: From W3C, "includes presentation attributes and elements that W3C expects to phase out as support for style sheets matures." (Source: http://www.w3.org/TR/html401/sgml/loosedtd.html)

W3C: World Wide Web Consortium. Sets the standards on the web, including CSS, HTML, XML. WAI is its Web Accessibility Initiative. (Source: http://www.volresource.org.uk/swit/webterm.htm)

Markup Languages:


CSS: Cascading Style Sheets. Language used to describe how an HTML document should be formatted. (Source: http://orafaq.com/glossary/faqglosc.htm)

SGML: Standard Generalized Markup Language; a system for organizing and tagging elements of a document. (Source: http://www.techiwarehouse.com/cms/engine.php?page_id=c3be6c7d&page=20)

XML: XML (Extensible Markup Language) is a standard for creating markup languages which describe the structure of data. It is not a fixed set of elements like HTML, but rather, it is like SGML (Standard Generalized Markup Language) in that it is a metalanguage, or a language for describing languages. (Source: http://www.acad.bg/beginner/gnrt/appendix/glossary.html)

XHTML: Extensible Hypertext Markup Language. A stricter remaking of HTML as an application of XML. The successor to HTML. (Source: http://www.robinlionheart.com/stds/html4/glossary)

HTML: Hyper Text Markup Language; the coding syntax used to write WWW documents, which are read by browsers. (Source: http://library.wexler.hunter.cuny.edu/lyannott/thesis_guide/libraryterms.html)

Hardware Definitions:


Bus: A data connection connection between two or more devices connected to the computer. (Source: http://www.computerhope.com/jargon/b/bus.htm)

CPU: Abbreviation for Central Processing Unit. The CPU is the "brain" of the computer. Every calculation and process made by a computer is executed by the CPU.(Source: http://www.build-your-own-computer-tips.com/cpu-definition.html)

Parallel: Refers to processes that occur simultaneously. Printers and other devices are said to be either parallel or serial. Parallel means the device is capable of receiving more than one bit at a time (that is, it receives several bits in parallel). Most modern printers are parallel. (Source: http://www.webopedia.com/TERM/p/parallel.html)

Serial: Of or relating to the sequential transmission of all the bits of a byte over one wire: a serial port; a serial printer. (Source: http://www.thefreedictionary.com/serial)

SCSI: SCSI (Small Computer System Interface) is a set of standards for physically connecting and transferring data between computers and peripheral devices. (Source: http://en.wikipedia.org/wiki/SCSI)

RS232: RS232 is an electrical signaling specification published by the Electronic Industries Association (EIA). Although not identified in the specification, the 25-pin (DB25) connector, with specific pin assignments, is commonly accepted as "the RS232 connector or the serial connector." (Source: http://www.cxrlarus.com/assets/glossary.html)

USB: Abbreviation for Universal Serial Bus. A widely used hardware interface for attaching peripheral devices. (Source: http://www.pcmag.com/encyclopedia_term/0,2542,t=USB&i=53531,00.asp)

Firewire: The term used to describe the connection between Digital Video (DV) cameras/players and DV capture cards. You need Firewire if you want to work with DV and remain lossless. Firewire or IEEE P1394 is the standard for transmitting compressed video data used by DV format digital videocassette recorders. (Source: http://www.itvdictionary.com/definitions/firewire_definition.html)

Hard Drive: A disk drive that reads data stored on hard disks. Also called hard disk drive. (Source: http://www.answers.com/topic/hard-drive?cat=technology)

Floppy Drive: A device that allows your computer to read floppy disks. (Source: http://www.bleepingcomputer.com/glossary/definition129.html)

CD-ROM/CD-RW Drive: A computer peripheral that plays back CD-ROMs (Read Only Memory) and CD-RWs (Re-Writable). (Source: http://www.bleepingcomputer.com/glossary/definition129.html)

SIMM: Abbreviation for Single Inline Memory Module. A high-density DRAM package alternative consisting of several components connected to a single printed circuit board. (Source: http://www.satech.com/glosofmemter.html)

DIMM: This is a type of memory connection that uses 168 pins. The most common type of DIMM is SDRAM (see it for more information). DIMM stands for Dual Inline Memory Module. (Source: http://www.basichardware.com/glossary.html)

RAM: Random-access memory: the most common computer memory which can be used by programs to perform necessary tasks while the computer is on; an integrated circuit memory chip allows information to be stored or accessed in any order and all storage locations are equally accessible. (Source: http://wordnet.princeton.edu/perl/webwn?s=ram)

COM1: The name of the first serial port in a system. Additional ports are labeled COM2, COM3 and COM4. (Source: http://www.micro2000uk.co.uk/hardware_glossary.htm)

ROM: Read Only Memory. Data cannot be stored in this type of memory, but instead it usually contains programs or other information that does not disappear when the computer is turned off. (Source: http://apple2history.org/history/glossary.html)

NIC: Network Interface Card. A plug-in expansion card with a connection for a network cable, or an antenna for wireless transmission. Also called a network adapter card. (Source: http://www.micro2000uk.co.uk/network_glossary.htm)

Driver: A program designed to interface a particular piece of hardware to an operating system or other software. (Source: http://www.ontrack.com/glossary/)

IDE: IDE stands for Integrated/Intelligent Drive Electronics. It is an ATA specification (the terms are often used interchangeably). This is the most common disk interface for hard drives, CD-ROM drives, etc. (Source: http://www.basichardware.com/glossary.html)

Virtual Memory: This is system memory that is simulated by the hard drive. When all the RAM is being used (for example if there are many programs open at the same time) the computer will swap data to the hard drive and back to give the impression that there is slightly more memory. (Source: http://www.crucial.com/library/glossary.asp)

Fragmentation: The state of having a file scattered around a disk in pieces rather than existing in one contiguous area of the disk. Fragmented files are slower to read than defragmented files. (Source: http://www.ontrack.com/glossary/)

Virtual Machine: An environment created by Windows running in 386 enhanced mode in which an application can run and behave as if it had an entire machine all to itself. Windows in 386 enhanced mode can have multiple applications running in their own separate virtual machines at the same time. (Source: http://www.wrightcolorgraphics.com/v.htm)

Modem: Short for modulator/demodulator. A communications device that converts one form of a signal to another that is suitable for transmission over communication circuits, typically from digital to analog and then from analog to digital. (Source: http://www.intermec.com/eprise/main/Intermec/Content/About/GlossarySubpages/Glossary_MN)

Internet Definitions:


URL: An acronym for "Uniform Resource Locator," this is the address of a resource on the Internet. World Wide Web URLs begin with http: (Source: http://www.valpo.edu/library/jargon.html

URI: Uniform Resource Identifier. A standard means of addressing resources on the Web. (Source: http://www.murdoch.edu.au/trainweb/glossary.html)

HTTP: Hyper Text Transfer Protocol; the World Wide Web protocol that performs the request and retrieve functions of a server. Commonly seen as the first part of a website address. (Source: http://ublib.buffalo.edu/libraries/help/glossary.html)

ISP: ISP stands for Internet Service Provider. These are typically fee-based companies that provide dial-up access to the Internet via SLP, PPP, or TCP/IP. (Source: http://www.vitalnet.net/h/support_glossary.html)

Blog: Blog is short for weblog. A weblog is a journal (or newsletter) that is frequently updated and intended for general public consumption. Blogs generally represent the personality of the author or the Web site. (Source: http://www.bytowninternet.com/glossary)

Wiki: A website or similar online resource which allows users to add and edit content collectively. (Source: http://www.parliament.vic.gov.au/sarc/E-Democracy/Final_Report/Glossary.htm)

Net Neutrality: Network neutrality is a principle of internet regulation with particular relevance to the regulation of broadband. (source: http://en.wikipedia.org/wiki/Network_neutrality)

Typography Definitions:


Font: A set of characters in a specific typeface, at a specific point size and in a specific style. (Source: http://www.printingyoucantrust.com/glossary.cfm)

Font Family: Group of typefaces with similar characteristics. For example, the sans serif typefaces Arial, Arial Bold, Arial Bold Italic, Arial Italic, Small Fonts, and MS Sans Serif are all part of the Swiss font family. (Source: http://www.proximasoftware.com/fontexpert/terms/f.htm)

Sans-serif: A typeface that has no serifs (small strokes at the end of main stroke of the character). (Source: http://www.semaphoreinc.com/esources/newsletters/2002_07_b.html)

Serif: A small cross-stroke that adorns the line ends of a letter within a serif typeface. (Source: http://open-site.org/Arts/Literature/Typography/Terminology/)

Italic/Oblique: Text that is used to denote emphasis by slanting the type body forward. Ex. hello (Source: http://open-site.org/Arts/Literature/Typography/Terminology/)

Mono-space: All characters are given the same horizontal spacing. (Source: http://www.cs.helsinki.fi/u/hahonen/uusmedia/sisalto/css_dom/typographical.html)

Proportionally Spaced: Using different widths for different characters. In a proportionally spaced font, the letter I is narrower than the letter q and the letter m wider. This book uses a proportionally spaced font, as do most books, magazines, and newspapers.(Source: http://www.webopedia.com/TERM/P/proportional_spacing.html)

Point: A measurement for type. Most books are set in 10 or 11 point type. Twelve points equal one pica em. (Source: http://www.publishers.org.uk/paweb/paweb.nsf/0/AB6267C37C470E1480256AD80057F556)

Character: Any letter, number, punctuation mark, or space in printed matter. (Source: http://www.logo-design99.com/logo-design-terms1.htm)

@: A commercial at, @, also called an at symbol, an at sign, or just at, is a symbolic abbreviation for the word at. (Source: http://en.wikipedia.org/wiki/At_symbol)

&: An ampersand (&), also commonly called an "and sign" is a logogram representing the conjunction "and." (Source: http://en.wikipedia.org/wiki/Ampersand)

~: A tilde (~) in a web address usually indicates that this is someone's personal web page. (Source: http://library.mcneese.edu/tutorial/glossary.htm)

Forward-slash: Most commonly referred to as slash or forward slash, its proper name is solidus or virgule. Slash is the most common term but it is sometimes also called a diagonal. The solidus is a punctuation mark used as a separator, a word substitute, for mathematic expressions, and in Web addresses (URL or Uniform Resource Locator). (Source: http://desktoppub.about.com/cs/expertcharacters/f/solidus.htm)

Backslash: A keyboard character (\) with various uses in computing and computer programming. (Source: http://encarta.msn.com/encnet/features/dictionary/DictionaryResults.aspx?refid=1861588296)

Networking Definitions:


Phishing: Phishing is a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDs and passwords. (Source: http://www.digitalstrategy.govt.nz/templates/Page____60.aspx)

Worm: This is a special type of virus that spreads without any user interaction, typically by exploiting a flaw in popular software. (Source: https://www.fnb.co.za/legallinks/securitycentre/terms.html)

VPN: A VPN is a form of communication over networks that are public in ownership, but emulate a private network in terms of security. (Source: http://www.globalknowledge.net/help/glossary.aspx)

PGP: Pretty Good Privacy - an encryption scheme which uses the "public key" approach - messages are encrypted using the publicly available key, but can only be deciphered by the intended recipient via the private key. (Source: http://www.geeksnet.com/faq/glossary.htm)

Audit Log: Computer files containing details of amendments to records, which may be used in the event of system recovery being required. (Source:http://www.dns.co.uk/advisorycentre/glossary/)

Availability: The property of information being accessible and usable upon demand by an authorized entity or process. (Source: http://www.ecommercepki.com/cps/glossary.htm)

Buffer Overflow: An error caused when a program tries to store too much data in a temporary storage area. (Source: http://www.smoothwall.net/support/glossary.php)

Logic Bomb: A logic bomb is a program which will execute a pre-programmed routine (frequently destructive) when a designated condition is met. Logic bombs do not make copies of themselves. (Source: http://viruscenter.freedom.net/html/glossary.html)

Social Engineering: An attack based on deceiving users or administrators at the target site. Social engineering attacks are typically carried out by telephoning users or operators and pretending to be an authorized user, to attempt to gain illicit access to systems. (Source: http://www.atharmahboob.com/courses/security/glossary/glossary-firewall.htm)

Strong Passwords: The necessary quality of the password depends on how well the password system limits attempts to guess a user's password, whether by a person who knows the user well, or a computer trying millions of possibilities. (Source: http://en.wikipedia.org/wiki/Password_strength)

Confidentiality: Assuring information will be kept secret, with access limited to appropriate persons. (Source: http://www.tsl.state.tx.us/ld/pubs/compsecurity/glossary.html)

Authentication: Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information. (Source: http://www.pki.vt.edu/help/glossary.html)

Virus: A computer virus is a piece of code that is secretly introduced into a system in order to corrupt it or destroy data. Often viruses are hidden in other programs or documents and when opened, the virus is let loose. (Source: https://www.fnb.co.za/legallinks/securitycentre/terms.html)

Firewall: A firewall is a system that secures a network, shielding it from access by unauthorized users. (Source: http://www.intel.com/products/glossary/body.htm)

Spam: Unsolicited e-mail. There are two common usages: 1) mass e-mailings by commercial sites to recipients who have not requested any contact, and 2) e-mail sent to intentionally annoy or harass the recipient, including crashing his or her computer by overloading its e-mail capacity. (Source: http://index.realcartu.com/frames/s.html)

PKI: Public Key Infrastructure. Also called public key cryptography, an applied mathematics of transforming messages into seemingly unintelligible forms and back again. (Source: http://www.aishealth.com/EHealthBusiness/EHealthTerms.html)

Integrity: Assurance that the data are unchanged from creation to reception. (Source: http://www.pki.vt.edu/help/glossary.html)

Encryption: To convert data from its original form to a form that can only be read by someone that can reverse the encryption. The purpose of encryption is to prevent unauthorized reading of the data. (Source: http://www.eggheaddesign.co.uk/glossary.aspx)

Malware: Short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse. (Source: http://webopedia.com/TERM/m/malware.html)

Spyware: Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. (Source: http://webopedia.com/TERM/s/spyware.html)

Trojan Horse: A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. (Source: http://webopedia.com/TERM/T/Trojan_horse.html)

Zigbee: Pioneered by Philips Semiconductors, ZigBee is a low data rate, two-way standard for home automation and data networks. The standard originates from the Firefly Working Group and provides a specification for up to 254 nodes including one master, managed from a single remote control. Real usage examples of ZigBee includes home automation tasks such as turning lights on, turn up the heat, setting the home security system, or starting the VCR. With ZigBee all these tasks can be done from anywhere in the home at the touch of a button. ZigBee also allows for dial-in access via the Internet for automation control. (Source: http://webopedia.com/TERM/Z/ZigBee.html)

BPL: Abbreviated as BPL, broadband over power line is a technology that allows Internet data to be transmitted over utility power lines. To use BPL the subscriber needs to use a special broadband modem (phone, cable or satellite) that plugs into an electrical outlet. Internet services are received via radio waves over electrical lines, using many of the same frequencies that are traditionally used for ham radio. There are two types of BPL: in-building BPL technology, which uses the electrical wiring within a building and access BPL, which uses the electrical power distribution grid to provide broadband Internet access. (Source: http://webopedia.com/TERM/B/BPL.html)

Miscellaneous Definitions:


Desktop: In graphical user interfaces, a desktop is the metaphor used to portray file systems. Such a desktop consists of pictures, called icons, that show cabinets, files, folders, and various types of documents (that is, letters, reports, pictures). (Source: http://www.webopedia.com/TERM/d/desktop.html)

Binary Number: The binary or base-two numeral system is a system for representing numbers in which a radix of two is used; that is, each digit in a binary numeral may have either of two different values. Typically, the symbols 0 and 1 are used to represent binary numbers. (Source: http://en.wikipedia.org/wiki/Binary_number)

Hexadecimal: A numbering system which uses a base of 16. The first ten digits are 0-9 and the next six are A-F. (Source:http://www.zacsdesign.com/edu/basic_multimedia_glossary.htm)

Octet: A grouping of 8 bits; similar, but not identical to, a byte. (Source: http://www.e-ratecentral.com/resources/help/glossary/o.asp)

ASCII: A code that represents letters, numerals, punctuation marks and control signals as seven bit groups. It is used as a standard code by the transmission of data. The values range from hex value 00 to hex value 7F. (Source: http://www.notepage.net/wireless-messaging-glossary.htm)

RF: Radio Frequency. Wireless communication technology using electromagnetic waves to transmit and receive data. RF provides real-time access to a host computer. (Source: http://www.systemid.com/education/autoid_glossary.asp)

FAT: File Allocation Table. A file system table used by the FAT-file systems. It contains information about where on the disk the content of the files are stored. (Source: http://www.dataleach.com/resources/recovery-terms.php)

NTFS: The file system designed to the operating system Windows NT. This file system is more advanced than the FAT file system used by the earlier Windows operating systems, with regards to data structures, filenames, security and access control. (Source: http://www.dataleach.com/resources/recovery-terms.php)

IR: Infra Red. This uses a beam of light that is invisible to us humans to either control a device without wires or as a method of transferring data from camera to computer (or printer) without cables. Some cameras also employ infrared in the auto focusing system. (Source: http://www.all-things-photography.com/digital-dictionary.html)

OS: An operating system (sometimes abbreviated as "OS") is the program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer. The other programs are called applications or application programs. (Source: http://www.webasyst.net/glossary.htm)